About 400 students from USU, University of Utah, Brigham Young University, Weber State University and Dixie State University are expected to attend. The intercollegiate event is open to any college student interested in computer science, programming and technology.

• Great opportunity for reporters to interview computer science students about the importance of programming skills in today’s economy

Student organizer Steven Jones says HackUSU connects students with industry and keeps them updated on what employers expect from new talent.

Students participate in the 2015 HackUSU event at Utah State University.

“There’s a huge disconnect between businesses and the developer community,” he explained. "In some cases, students may know the principles of computer science, but they lack the skills employers want. HackUSU is the bridge that keeps students on par with industry expectations.”

During the 36-hour event, students compete to build software and hardware tools to solve everyday problems encountered in technology or programming.

“They can make anything they want,” added Jones. “We provide them with the venue and hardware lab so they have the tools they need, including access to Raspberry Pi computers.”

“Hackathons are where innovation takes flight,” said Cory Christensen, student director of this year’s event. “I’ve never seen so much creativity condensed into one location before.”

At the end of the event, teams will present their creations for a chance to win prizes. Corporate sponsors include Qualtrics, Major League Hacking and Raytheon.

Reporters are welcome to attend and are encouraged to speak with student participants. For more information about the event and schedule, visit HackUSU.org.

###

Editor’s Note: The term ‘hack’ does not always refer to the illegal entry into a secure computer system. In this context, hack means using a combination of tools and knowledge to develop solutions to everyday problems encountered in programming and technology. USU condemns any illegal activity associated with circumventing cyber-security systems.